Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 

















File:Monitor padlock.svg




Page contents not supported in other languages.  









File
Talk
 

















Read
View on Commons
 








Tools
   


Actions  



Read
View on Commons
 




General  



What links here
Upload file
Special pages
Printable version
Page information
Get shortened URL
Download QR code
 
















Appearance
   

 





This is a file from the Wikimedia Commons

From Wikipedia, the free encyclopedia
 


File

File history

File usage

Global file usage

Metadata
File:Monitor padlock.svg
Size of this PNG preview of this SVG file: 486 × 445 pixels. Other resolutions: 262 × 240 pixels | 524 × 480 pixels | 839 × 768 pixels | 1,118 × 1,024 pixels | 2,237 × 2,048 pixels.

Original file(SVG file, nominally 486 × 445 pixels, file size: 8 KB)





Summary

Description
English: A candidate icon for Portal:Computer security
Date
Source Own work (Original text: self-made)
Author Lunarbunny (talk)

Licensing

LunarbunnyatEnglish Wikipedia, the copyright holder of this work, hereby publishes it under the following licenses:
w:en:Creative Commons
attribution share alike
This file is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported license.
You are free:
  • to share – to copy, distribute and transmit the work
  • to remix – to adapt the work
  • Under the following conditions:
    • attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
    • share alike – If you remix, transform, or build upon the material, you must distribute your contributions under the same or compatible license as the original.
    GNU head Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled GNU Free Documentation License.
    You may select the license of your choice.

    Original upload log

    Transferred from en.wikipedia to Commons by Logan using CommonsHelper.

    The original description page was here. All following user names refer to en.wikipedia.

    Captions

    Add a one-line explanation of what this file represents

    Items portrayed in this file

    depicts

    25 February 2008

    File history



    Click on a date/time to view the file as it appeared at that time.
    Date/TimeThumbnailDimensionsUserComment
    current03:26, 16 March 2011Thumbnail for version as of 03:26, 16 March 2011486 × 445 (8 KB)File Upload Bot (Magnus Manske) {{BotMoveToCommons|en.wikipedia|year={{subst:CURRENTYEAR}}|month={{subst:CURRENTMONTHNAME}}|day={{subst:CURRENTDAY}}}} {{Information |Description={{en|A candidate icon for en:Portal:Computer security}} |Source=Transferred from [http://en.wikipedia.



    More than 100 pages use this file. The following list shows the first 100 pages that use this file only. A full list is available.

    Corkscrew (program)

    CrossCrypt

    Data diddling

    L0phtCrack

    Nessus (software)

    Pluggable authentication module

    Resource Access Control Facility

    Secure file transfer program

    Software blacklist

    Voluntary collective licensing

    Talk:40-bit encryption

    Talk:Access-control list

    Talk:Adobe Flash

    Talk:Adrian Lamo

    Talk:Authentication

    Talk:BIOS

    Talk:BellLaPadula model

    Talk:Biba Model

    Talk:Browser exploit

    Talk:Bruce Schneier

    Talk:Brute-force attack

    Talk:Buffer overflow

    Talk:CIH (computer virus)

    Talk:Certificate authority

    Talk:Children's Online Privacy Protection Act

    Talk:Chinese wall

    Talk:ClamAV

    Talk:Comparison of computer viruses

    Talk:Computer forensics

    Talk:Computer insecurity

    Talk:Cryptographic hash function

    Talk:Cybercrime

    Talk:Data security

    Talk:Demon dialing

    Talk:Dictionary attack

    Talk:Download.ject

    Talk:Edward Felten

    Talk:Electronic Frontier Foundation

    Talk:Electronic voting

    Talk:Exec Shield

    Talk:Federal Information Processing Standards

    Talk:Full disclosure (computer security)

    Talk:Google Hacks

    Talk:HTTP cookie

    Talk:Hack (term)

    Talk:Hacker Manifesto

    Talk:Hacker ethic

    Talk:Hackers: Heroes of the Computer Revolution

    Talk:Honeypot (computing)

    Talk:Internet security

    Talk:Iptables

    Talk:Karl Koch (hacker)

    Talk:Kevin Mitnick

    Talk:LM hash

    Talk:List of security hacking incidents

    Talk:Mail and wire fraud

    Talk:Man-in-the-middle attack

    Talk:Mark Abene

    Talk:Melissa (computer virus)

    Talk:Modula

    Talk:Morris worm

    Talk:Mydoom

    Talk:Null character

    Talk:Obfuscation (software)

    Talk:Off-by-one error

    Talk:OpenBSD

    Talk:Operation Sundevil

    Talk:Password Authentication Protocol

    Talk:Personal identification number

    Talk:Phishing

    Talk:Phreaking

    Talk:Pretty Good Privacy

    Talk:Privacy

    Talk:Proxy server

    Talk:Public key infrastructure

    Talk:RADIUS

    Talk:Reverse engineering

    Talk:Role-based access control

    Talk:SQL Slammer

    Talk:Script kiddie

    Talk:Secure Shell

    Talk:Security-Enhanced Linux

    Talk:Security-focused operating system

    Talk:Security through obscurity

    Talk:Self-driving car

    Talk:Shellcode

    Talk:Snort (software)

    Talk:Social engineering

    Talk:Social engineering (security)

    Talk:Software cracking

    Talk:Spy Sweeper

    Talk:Sudo

    Talk:Synopsys

    Talk:Timeline of computer viruses and worms

    Talk:Trojan horse (computing)

    Talk:Tubular pin tumbler lock

    Talk:Virtual private network

    Talk:WarGames

    Talk:Wardialing

    Talk:Web of trust


    View more links to this file.

    Global file usage


    The following other wikis use this file:

    Usage on ar.wikipedia.org

    فيروس حاسوب

    دودة حاسوب

    حصان طروادة (حاسوب)

    انتهاك الخصوصية

    برمجية إعلانات

    راصد لوحة مفاتيح

    جدار حماية (حوسبة)

    طاهر الجمل

    إرهاب سيبراني

    هجمات الحرمان من الخدمات

    محاكاة افتراضية

    تصنيف:أمن الحاسوب

    ذا ماتريكس (فيلم)

    تعمية (تخصص)

    برمجية خبيثة

    رونالد ريفست

    كيفين ميتنيك

    اجتياز نات

    فري بي إس دي

    واير شارك

    كاين (برنامج)

    نت ستومبلر (برنامج)

    أمن المعلومات

    تجاوز سعة المخزن المؤقت

    دافيد هاينماير هانسون

    ملقم افتراضي

    آلة افتراضية

    نافذة منبثقة

    كارنيفور

    إيكيلون

    إن أوبونتو

    آي بي كوب

    دانييل يوليوس بيرنشتاين

    راسم المرور متعدد المسار

    شاشة الموت الزرقاء

    سيسكو

    زون ألارم

    ملف الفهرس

    كلاموين

    تصنيف:فيروسات الحاسوب

    نورتن أنتي فايرس

    تصنيف:ترميز

    إف تي بي إس

    وكالة الأمن القومي الأمريكية

    جريمة الحاسوب

    شبكة خاصة افتراضية

    موت قاسي 4

    حروف تحقق

    وكيل (حوسبة)

    تروكربت



    View more global usage of this file.

    Metadata

    If the file has been modified from its original state, some details may not fully reflect the modified file.


    Retrieved from "https://en.wikipedia.org/wiki/File:Monitor_padlock.svg"







    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki